blob: a30829e57fab6521e733c25b96b3a4bef3d89206 [file] [log] [blame]
Harald Welte9fbcf4b2018-12-07 07:56:52 +01001module PCU_Tests_RAW {
2
3/* "RAW" PCU tests: Talk directly to the PCU socket of OsmoPCU on the one hand side (emulating
4 the BTS/BSC side PCU socket server) and the Gb interface on the other hand side. No NS/BSSGP
5 Emulation is used; rather, we simply use the NS_CodecPort to implement both standard and non-
6 standard procedures on the NS and BSSGP level. The goal of these tests is to test exactly
7 those NS and BSSGP implementations on the BSS (PCU) side. */
8
9import from General_Types all;
10import from Osmocom_Types all;
11import from NS_Types all;
12import from BSSGP_Types all;
13import from Osmocom_Gb_Types all;
14
15import from BSSGP_Emulation all; /* BssgpConfig */
16import from NS_Emulation all; /* NSConfiguration */
17
18import from UD_Types all;
19import from PCUIF_Types all;
20import from PCUIF_CodecPort all;
21import from IPL4asp_Types all;
22import from NS_CodecPort all;
23import from NS_CodecPort_CtrlFunct all;
24import from Native_Functions all;
25import from PCU_Tests all;
26
27modulepar {
28 charstring mp_pcu_sock_path := PCU_SOCK_DEFAULT;
29}
30
31type component RAW_NS_CT {
32 /* UDP port towards the bottom (IUT) */
Harald Weltebf768242019-02-21 22:19:21 +010033 port NS_CODEC_PT NSCP[4];
34 var ConnectionId g_ns_conn_id[4] := {-1, -1, -1, -1};
35 var NSConfiguration g_nsconfig[4];
Harald Welte9fbcf4b2018-12-07 07:56:52 +010036 timer g_T_guard;
Harald Welteea3c7e92019-03-01 19:34:55 +010037}
Harald Welte9fbcf4b2018-12-07 07:56:52 +010038
Harald Welteea3c7e92019-03-01 19:34:55 +010039type component RAW_PCU_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +010040 /* PCUIF (we emulate the BTS part) */
41 port PCUIF_CODEC_PT PCU;
42 var ConnectionId g_pcu_conn_id := -1;
43}
44
Harald Welteea3c7e92019-03-01 19:34:55 +010045type component RAW_Test_CT extends RAW_NS_CT, RAW_PCU_CT {
46}
47
Harald Welte9fbcf4b2018-12-07 07:56:52 +010048private altstep as_Tguard() runs on RAW_NS_CT {
49 [] g_T_guard.timeout {
50 setverdict(fail, "Timeout of T_guard");
51 mtc.stop;
52 }
53}
54
Harald Welteea3c7e92019-03-01 19:34:55 +010055function f_init_pcuif() runs on RAW_PCU_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +010056 map(self:PCU, system:PCU);
57
58 /* Connect the Unix Domain Socket */
59 g_pcu_conn_id := f_pcuif_listen(PCU, mp_pcu_sock_path);
60 PCU.receive(UD_connected:?);
61
62 /* Wait for PCU_VERSION and return INFO_IND */
63 PCU.receive(t_SD_PCUIF(g_pcu_conn_id, tr_PCUIF_TXT_IND(0, PCU_VERSION, ?)));
64 /* FIXME: make sure to use parameters from mp_gb_cfg.cell_id in the PCU INFO IND */
65 var template PCUIF_Message info_ind := ts_PCUIF_INFO_IND(bts_nr := 0,
66 nsei := mp_nsconfig.nsei,
67 nsvci := mp_nsconfig.nsvci,
68 bvci := mp_gb_cfg.bvci,
69 local_port := mp_nsconfig.remote_udp_port,
70 remote_port := mp_nsconfig.local_udp_port,
71 remote_ip := f_inet_haddr(mp_nsconfig.local_ip)
72 );
73 PCU.send(t_SD_PCUIF(g_pcu_conn_id, info_ind));
74}
75
Harald Weltebf768242019-02-21 22:19:21 +010076function f_init_ns_codec(integer idx := 0, float guard_secs := 60.0) runs on RAW_NS_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +010077 var Result res;
Harald Weltebf768242019-02-21 22:19:21 +010078
79 if (not g_T_guard.running) {
80 g_T_guard.start(guard_secs);
81 activate(as_Tguard());
82 }
83
84 if (not isbound(g_nsconfig) or not isbound(g_nsconfig[idx])) {
85 /* copy most parts from mp_nsconfig */
86 g_nsconfig[idx] := mp_nsconfig;
87 /* adjust those parts different for each NS-VC */
88 g_nsconfig[idx].nsvci := mp_nsconfig.nsvci + idx;
89 g_nsconfig[idx].local_udp_port := mp_nsconfig.local_udp_port + idx;
90 }
91
92 map(self:NSCP[idx], system:NSCP);
Harald Welte9fbcf4b2018-12-07 07:56:52 +010093 /* Connect the UDP socket */
Harald Weltebf768242019-02-21 22:19:21 +010094 log("connecting NSCP[", idx, "] to ", g_nsconfig[idx]);
95 res := f_IPL4_connect(NSCP[idx], g_nsconfig[idx].remote_ip, g_nsconfig[idx].remote_udp_port,
96 g_nsconfig[idx].local_ip, g_nsconfig[idx].local_udp_port, 0, { udp := {}});
Harald Welte9fbcf4b2018-12-07 07:56:52 +010097 if (not ispresent(res.connId)) {
Harald Weltebf768242019-02-21 22:19:21 +010098 setverdict(fail, "Could not connect NS UDP socket, check your configuration ", g_nsconfig[idx]);
Harald Welte9fbcf4b2018-12-07 07:56:52 +010099 mtc.stop;
100 }
Harald Weltebf768242019-02-21 22:19:21 +0100101 g_ns_conn_id[idx] := res.connId;
102
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100103}
104
Harald Weltebf768242019-02-21 22:19:21 +0100105function f_ns_exp(template PDU_NS exp_rx, integer idx := 0) runs on RAW_NS_CT return PDU_NS {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100106 var NS_RecvFrom nrf;
107 log("f_ns_exp() expecting ", exp_rx);
108 alt {
Harald Weltebf768242019-02-21 22:19:21 +0100109 [] NSCP[idx].receive(t_NS_RecvFrom(exp_rx)) -> value nrf { }
110 [] NSCP[idx].receive {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100111 setverdict(fail, "Received unexpected NS: ", nrf);
112 mtc.stop;
113 }
114 }
115 return nrf.msg;
116}
117
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100118/* perform outbound NS-ALIVE procedure */
Harald Weltebf768242019-02-21 22:19:21 +0100119function f_outgoing_ns_alive(integer idx := 0) runs on RAW_NS_CT {
120 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], t_NS_ALIVE));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100121 alt {
Harald Weltebf768242019-02-21 22:19:21 +0100122 [] NSCP[idx].receive(t_NS_RecvFrom(t_NS_ALIVE_ACK));
123 [] NSCP[idx].receive { repeat; }
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100124 }
125}
126
Harald Welteecd159e2019-03-16 13:36:07 +0100127/* perform outbound NS-ALIVE procedure */
128function f_outgoing_ns_alive_no_ack(integer idx := 0, float tout := 10.0) runs on RAW_NS_CT {
129 timer T := tout;
130 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], t_NS_ALIVE));
131 T.start;
132 alt {
133 [] NSCP[idx].receive(t_NS_RecvFrom(t_NS_ALIVE_ACK)) {
134 setverdict(fail, "Received unexpected NS-ALIVE ACK");
135 }
136 [] NSCP[idx].receive { repeat; }
137 [] T.timeout {
138 setverdict(pass);
139 }
140 }
141}
142
143/* ensure no matching message is received within 'tout' */
144function f_ensure_no_ns(template PDU_NS ns := ?, integer idx := 0, float tout := 3.0)
145runs on RAW_Test_CT {
146 timer T := tout;
147 T.start;
148 alt {
149 [] NSCP[idx].receive(t_NS_RecvFrom(ns)) {
150 setverdict(fail, "NS-ALIVE from unconfigured (possibly initial) endpoint");
151 }
152 [] T.timeout {
153 setverdict(pass);
154 }
155 }
156}
157
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100158/* perform outbound NS-BLOCK procedure */
Harald Weltebf768242019-02-21 22:19:21 +0100159function f_outgoing_ns_block(NsCause cause, integer idx := 0) runs on RAW_NS_CT {
160 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], ts_NS_BLOCK(cause, g_nsconfig[idx].nsvci)));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100161 alt {
Harald Weltebf768242019-02-21 22:19:21 +0100162 [] NSCP[idx].receive(t_NS_RecvFrom(tr_NS_BLOCK_ACK(g_nsconfig[idx].nsvci)));
163 [] NSCP[idx].receive { repeat; }
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100164 }
165}
166
167/* receive NS-ALIVE and ACK it */
Harald Weltebf768242019-02-21 22:19:21 +0100168altstep as_rx_alive_tx_ack(boolean oneshot := false, integer idx := 0) runs on RAW_NS_CT {
169 [] NSCP[idx].receive(t_NS_RecvFrom(t_NS_ALIVE)) {
170 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], t_NS_ALIVE_ACK));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100171 if (not oneshot) { repeat; }
172 }
173}
174
175/* Receive a BSSGP RESET for given BVCI and ACK it */
Harald Weltebf768242019-02-21 22:19:21 +0100176altstep as_rx_bvc_reset_tx_ack(BssgpBvci bvci, boolean oneshot := false, integer idx := 0) runs on RAW_NS_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100177 var NS_RecvFrom ns_rf;
178 /* FIXME: nail down received cell_id in match */
Harald Weltebf768242019-02-21 22:19:21 +0100179 [] NSCP[idx].receive(t_NS_RecvFrom(tr_NS_UNITDATA(t_SduCtrlB, 0,
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100180 decmatch tr_BVC_RESET(?, bvci, ?))))
181 -> value ns_rf {
182 var PDU_BSSGP bssgp_rx := dec_PDU_BSSGP(ns_rf.msg.pDU_NS_Unitdata.nS_SDU);
183 var PDU_BSSGP bssgp_tx := valueof(ts_BVC_RESET_ACK(bvci, mp_gb_cfg.cell_id));
Harald Weltebf768242019-02-21 22:19:21 +0100184 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], ts_NS_UNITDATA(t_SduCtrlB, 0, enc_PDU_BSSGP(bssgp_tx))));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100185 if (not oneshot) { repeat; }
186 }
187}
188
189
190/* Receive a BSSGP UNBLOCK for given BVCI and ACK it */
Harald Weltebf768242019-02-21 22:19:21 +0100191altstep as_rx_bvc_unblock_tx_ack(BssgpBvci bvci, boolean oneshot := false, integer idx := 0) runs on RAW_NS_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100192 var NS_RecvFrom ns_rf;
Harald Weltebf768242019-02-21 22:19:21 +0100193 [] NSCP[idx].receive(t_NS_RecvFrom(tr_NS_UNITDATA(t_SduCtrlB, 0,
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100194 decmatch t_BVC_UNBLOCK(bvci))))
195 -> value ns_rf {
196 var PDU_BSSGP bssgp_rx := dec_PDU_BSSGP(ns_rf.msg.pDU_NS_Unitdata.nS_SDU);
197 var PDU_BSSGP bssgp_tx := valueof(t_BVC_UNBLOCK_ACK(bvci));
Harald Weltebf768242019-02-21 22:19:21 +0100198 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], ts_NS_UNITDATA(t_SduCtrlB, 0, enc_PDU_BSSGP(bssgp_tx))));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100199 if (not oneshot) { repeat; }
200 }
201}
202
203/* Receive a BSSGP FLOW-CONTROL-BVC and ACK it */
Harald Weltebf768242019-02-21 22:19:21 +0100204altstep as_rx_bvc_fc_tx_ack(BssgpBvci bvci, boolean oneshot := false, integer idx := 0) runs on RAW_NS_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100205 var NS_RecvFrom ns_rf;
Harald Weltebf768242019-02-21 22:19:21 +0100206 [] NSCP[idx].receive(t_NS_RecvFrom(tr_NS_UNITDATA(t_SduCtrlB, bvci,
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100207 decmatch tr_BVC_FC_BVC)))
208 -> value ns_rf {
209 var PDU_BSSGP bssgp_rx := dec_PDU_BSSGP(ns_rf.msg.pDU_NS_Unitdata.nS_SDU);
210 var OCT1 tag := bssgp_rx.pDU_BSSGP_FLOW_CONTROL_BVC.tag.unstructured_Value;
211 var PDU_BSSGP bssgp_tx := valueof(t_BVC_FC_BVC_ACK(tag));
Harald Weltebf768242019-02-21 22:19:21 +0100212 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], ts_NS_UNITDATA(t_SduCtrlB, bvci, enc_PDU_BSSGP(bssgp_tx))));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100213 if (not oneshot) { repeat; }
214 }
215}
216
217/**********************************************************************************
218 * Classic Gb/IP bring-up test cases using NS-{RESET,BLOCK,UNBLOCK} and no IP-SNS *
219 **********************************************************************************/
220
221/* Receive a NS-RESET and ACK it */
Harald Weltebf768242019-02-21 22:19:21 +0100222private altstep as_rx_ns_reset_ack(boolean oneshot := false, integer idx := 0) runs on RAW_NS_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100223 var NS_RecvFrom ns_rf;
Harald Weltebf768242019-02-21 22:19:21 +0100224 [] NSCP[idx].receive(t_NS_RecvFrom(tr_NS_RESET(NS_CAUSE_OM_INTERVENTION, g_nsconfig[idx].nsvci,
225 g_nsconfig[idx].nsei))) -> value ns_rf {
226 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], ts_NS_RESET_ACK(g_nsconfig[idx].nsvci,
227 g_nsconfig[idx].nsei)));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100228 if (not oneshot) { repeat; }
229 }
230}
231/* Receive a NS-UNBLOCK and ACK it */
Harald Weltebf768242019-02-21 22:19:21 +0100232private altstep as_rx_ns_unblock_ack(boolean oneshot := false, integer idx := 0) runs on RAW_NS_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100233 var NS_RecvFrom ns_rf;
Harald Weltebf768242019-02-21 22:19:21 +0100234 [] NSCP[idx].receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value ns_rf {
235 NSCP[idx].send(t_NS_Send(g_ns_conn_id[idx], t_NS_UNBLOCK_ACK));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100236 if (not oneshot) { repeat; }
237 }
238}
239
240/* test the NS-RESET procedure */
Harald Welteea3c7e92019-03-01 19:34:55 +0100241testcase TC_ns_reset() runs on RAW_Test_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100242 f_init_ns_codec();
243 f_init_pcuif();
244
245
246 /* Expect inbound NS-RESET procedure */
247 as_rx_ns_reset_ack(oneshot := true);
248 setverdict(pass);
249}
250
251/* ensure NS-RESET are re-transmitted */
Harald Welteea3c7e92019-03-01 19:34:55 +0100252testcase TC_ns_reset_retrans() runs on RAW_Test_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100253 f_init_ns_codec();
254 f_init_pcuif();
255
256 var integer i;
257 for (i := 0; i < 3; i := i+1) {
Harald Weltebf768242019-02-21 22:19:21 +0100258 NSCP[0].receive(t_NS_RecvFrom(tr_NS_RESET(NS_CAUSE_OM_INTERVENTION,
259 g_nsconfig[0].nsvci, g_nsconfig[0].nsei)));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100260 }
261
262 /* Expect inbound NS-RESET procedure */
263 as_rx_ns_reset_ack(oneshot := true);
264 setverdict(pass);
265}
266
267/* test the inbound NS-ALIVE procedure after NS-RESET */
Harald Welteea3c7e92019-03-01 19:34:55 +0100268testcase TC_ns_alive() runs on RAW_Test_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100269 f_init_ns_codec();
270 f_init_pcuif();
271
272 /* Expect inbound NS-RESET procedure */
273 as_rx_ns_reset_ack(oneshot := true);
274
275 /* wait for one ALIVE cycle, then ACK any further ALIVE in the background */
276 as_rx_alive_tx_ack(oneshot := true);
277 setverdict(pass);
278}
279
280/* Test for NS-RESET after NS-ALIVE timeout */
Harald Welteea3c7e92019-03-01 19:34:55 +0100281testcase TC_ns_alive_timeout_reset() runs on RAW_Test_CT {
Harald Weltebf768242019-02-21 22:19:21 +0100282 f_init_ns_codec(guard_secs := 100.0);
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100283 f_init_pcuif();
284
285 /* Expect inbound NS-RESET procedure */
286 as_rx_ns_reset_ack(oneshot := true);
287
288 /* wait for at least one NS-ALIVE */
Harald Weltebf768242019-02-21 22:19:21 +0100289 NSCP[0].receive(t_NS_RecvFrom(t_NS_ALIVE));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100290
291 /* wait for NS-RESET to re-appear, ignoring any NS-ALIVE until then */
292 alt {
293 [] as_rx_ns_reset_ack(oneshot := true) { setverdict(pass); }
Harald Weltebf768242019-02-21 22:19:21 +0100294 [] NSCP[0].receive(t_NS_RecvFrom(t_NS_ALIVE)) { repeat; }
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100295 }
296}
297
298/* test for NS-RESET/NS-ALIVE/NS-UNBLOCK */
Harald Welteea3c7e92019-03-01 19:34:55 +0100299testcase TC_ns_unblock() runs on RAW_Test_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100300 f_init_ns_codec();
301 f_init_pcuif();
302
303 /* Expect inbound NS-RESET procedure */
304 as_rx_ns_reset_ack(oneshot := true);
305
306 /* wait for one ALIVE cycle, then ACK any further ALIVE in the background */
307 as_rx_alive_tx_ack(oneshot := true);
308 activate(as_rx_alive_tx_ack());
309
310 as_rx_ns_unblock_ack(oneshot := true);
311 setverdict(pass);
312}
313
314/* test for NS-UNBLOCK re-transmissions */
Harald Welteea3c7e92019-03-01 19:34:55 +0100315testcase TC_ns_unblock_retrans() runs on RAW_Test_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100316 f_init_ns_codec();
317 f_init_pcuif();
318
319 /* Expect inbound NS-RESET procedure */
320 as_rx_ns_reset_ack(oneshot := true);
321
322 /* wait for one ALIVE cycle, then ACK any further ALIVE in the background */
323 as_rx_alive_tx_ack(oneshot := true);
324 activate(as_rx_alive_tx_ack());
325
326 /* wait for first NS-UNBLOCK, don't respond */
Harald Weltebf768242019-02-21 22:19:21 +0100327 NSCP[0].receive(t_NS_RecvFrom(t_NS_UNBLOCK));
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100328
329 /* wait for re-transmission of NS-UNBLOCK */
330 as_rx_ns_unblock_ack(oneshot := true);
331 setverdict(pass);
332}
333
334/* full bring-up of the Gb link for NS and BSSGP layer up to BVC-FC */
Harald Welteea3c7e92019-03-01 19:34:55 +0100335testcase TC_ns_full_bringup() runs on RAW_Test_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100336 f_init_ns_codec();
337 f_init_pcuif();
338
339 /* Expect inbound NS-RESET procedure */
340 as_rx_ns_reset_ack(oneshot := true);
341
342 /* wait for one ALIVE cycle, then ACK any further ALIVE in the background */
343 as_rx_alive_tx_ack(oneshot := true);
344 activate(as_rx_alive_tx_ack());
345
346 as_rx_ns_unblock_ack(oneshot := true);
347
348 f_outgoing_ns_alive();
349
350 /* Expect BVC-RESET for signaling (0) and ptp BVCI */
351 as_rx_bvc_reset_tx_ack(0, oneshot := true);
352 as_rx_bvc_reset_tx_ack(mp_gb_cfg.bvci, oneshot := true);
353 as_rx_bvc_unblock_tx_ack(mp_gb_cfg.bvci, oneshot := true);
354
355 /* wait for one FLOW-CONTROL BVC and then ACK any further in the future */
356 as_rx_bvc_fc_tx_ack(mp_gb_cfg.bvci, oneshot := true);
357 activate(as_rx_bvc_fc_tx_ack(mp_gb_cfg.bvci));
358 setverdict(pass);
359}
360
361/* test outbound (SGSN-originated) NS-BLOCK procedure */
Harald Welteea3c7e92019-03-01 19:34:55 +0100362testcase TC_ns_so_block() runs on RAW_Test_CT {
Harald Welte9fbcf4b2018-12-07 07:56:52 +0100363 f_init_ns_codec();
364 f_init_pcuif();
365
366 /* Expect inbound NS-RESET procedure */
367 as_rx_ns_reset_ack(oneshot := true);
368
369 /* wait for one ALIVE cycle, then ACK any further ALIVE in the background */
370 as_rx_alive_tx_ack(oneshot := true);
371 activate(as_rx_alive_tx_ack());
372
373 as_rx_ns_unblock_ack(oneshot := true);
374
375 f_outgoing_ns_alive();
376
377 f_outgoing_ns_block(NS_CAUSE_EQUIPMENT_FAILURE);
378 setverdict(pass);
379}
380
381
382control {
383 execute( TC_ns_reset() );
384 execute( TC_ns_reset_retrans() );
385 execute( TC_ns_alive() );
386 execute( TC_ns_alive_timeout_reset() );
387 execute( TC_ns_unblock() );
388 execute( TC_ns_unblock_retrans() );
389 execute( TC_ns_full_bringup() );
390 execute( TC_ns_so_block() );
391}
392
393
394
395
396
397
398}